What are the six basic methods used with SIP?

What will be an ideal response?


The SIP protocol makes use of the following method:
? INVITE (Session creation): an endpoint is invited to participate in the session
? ACK (Acknowledgment): response to INVITE
? BYE (Session termination): call is ended
? CANCEL: Pending request cancellation (no effect if request has been completed)
? REGISTER: Registration of user’s location
? OPTIONS: Query to determine capabilities of called party

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about connecting to networks?

A) A network is a group of two or more computers that are linked together to exchange data and share resources, such as printers and software. B) At work, you might access a network to share a printer but also to share software or computer storage devices. C) When you access the Internet, you are connecting to the second largest computer network in the world. D) At home, you might have a network if two or more computers in your house share a wireless printer.

Computer Science & Information Technology

____ refers to placing visual elements into a pleasing and understandable arrangement.

a. Layout b. Perspective c. Storyboard d. Thumbnail

Computer Science & Information Technology

DNS clients maintain a text file called Hosts that can contain static DNS entries, within what Windows directory is this file stored?

A. %systemroot%\System32 B. %systemroot%\drivers C. %systemroot%\System32\drivers\etc D. %systemroot%\dns\etc

Computer Science & Information Technology

Security efforts that seek to provide a superior level of performance in the protection of information are referred to as best business practices. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology